Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
6974e0f5ba06c09c75302525796422dc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6974e0f5ba06c09c75302525796422dc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6974e0f5ba06c09c75302525796422dc_JaffaCakes118.html
-
Size
37KB
-
MD5
6974e0f5ba06c09c75302525796422dc
-
SHA1
b02a3e584ef48e68c8a50e6b037c3c4fa34d90e5
-
SHA256
e9fd15527c92959304d6be741fe8750d148f2ffe7bdc1b902a386e7bf2f60c52
-
SHA512
ea474024a41b07fd7573389843102128b25ef2006a7da41cbea804a78378b91a9b3be41b2b2c075f10d187e0d068903627156745f4aa249cb4ba492b30bb65d5
-
SSDEEP
768:j58H/R2yFw9R/WD1EnDfasLpo7+ysmsqjbu7pu7HUMoorCo:jO/YyFw9R/WD1EnDfasVo7+ysmhjyKHT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2040 msedge.exe 2040 msedge.exe 1608 msedge.exe 1608 msedge.exe 1592 identity_helper.exe 1592 identity_helper.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1608 wrote to memory of 3752 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 3752 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 1028 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 2040 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 2040 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4944 1608 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6974e0f5ba06c09c75302525796422dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceff246f8,0x7ffceff24708,0x7ffceff247182⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17654009760419536502,4025160804635512705,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD5fc0d1c29a10b2e2a2ba9e3aa76985da3
SHA1d9109d9d24977b3505b7ddf0976d9f10514dcef3
SHA2560974b3eca3143f4eb4857a6624f9d52bcc473f3afe108ff1eb06e93e1c783de6
SHA512ae15a46d798b048fb2d7a5f6ed4f3fb7c4d00ae1fe79cb8b90a025bc4bafb3f3e6557d392643f90034d090ba5b89da83941edd89d5d6e61517beda2776ae5108
-
Filesize
6KB
MD5ed5c9a0f81a431dd1e7182b4c8bd51a9
SHA17a8e5fe6164eade4c0fd25b9ff8de5163f5cdff3
SHA25645c7e588abcb7a32afe38a892eafd219e3557b107b9fa7f31315423baa993779
SHA512244a5a4b2206a3b3524dd68dfc4ac412656b68821ffaf4af8a4aae20bcf000d6c21652fed884038285d791badff1d45811a8bc8b56c538ad6746efeb296a1761
-
Filesize
370B
MD5c6b7f1b66595a49494acdba6bac00583
SHA1c570bf21ac2b2cad876b726d8b47b5987c6a89b1
SHA25628448c5e3a8f3c0f824459c1f9845f29b28654ab6ceb9c65c5327e47657d1b20
SHA512a204041dd6c8cbb3a87b2621424a40d51e0cd9bc54a255acbd8abc06da03902b5e4d8b05b0d1ff27034e9af42cc0b53b4eb57b4d79c2ef2d60a5c7b58d5a310b
-
Filesize
368B
MD5ffa0f891b83709c15c22980edf6222f0
SHA1b9709baa7b26c5036d362b2508cc29791a2f571c
SHA2560698629d15c6a4ddd56807dafca0fa9c5c28cba224ad3d136115de86cc090677
SHA5128a87070cbce7807792093a2a0a1d84dbb4b9b87c41d56ebb49b375915fb6fd36604c9fd8d869525e368063dc26a46825bd7c28998f35b9f159c8c095402e5d21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d6dfd376b9a539ad7df59434a7e35301
SHA1c47a42b27a9043103bf96a8ae187de50c750bba7
SHA2565913914e2ba919a73aaa1a54423d5fa8e8b9bb82995ecfceeb2c1a78f5b57491
SHA51246fb28462bf263c916c60b979f4313106764cbc3e6857079e13e2d6dba2e8807e8c80a9fed036589a1bce9d9cdf580d27839d5207849d6a8d059666c5c730e4d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e